CN101939966A - Be used to use the notion of new equity to limit method and system to the access rights of subscriber profile information - Google Patents

Be used to use the notion of new equity to limit method and system to the access rights of subscriber profile information Download PDF

Info

Publication number
CN101939966A
CN101939966A CN2009801042776A CN200980104277A CN101939966A CN 101939966 A CN101939966 A CN 101939966A CN 2009801042776 A CN2009801042776 A CN 2009801042776A CN 200980104277 A CN200980104277 A CN 200980104277A CN 101939966 A CN101939966 A CN 101939966A
Authority
CN
China
Prior art keywords
user
peer
group
synthetic application
synthetic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009801042776A
Other languages
Chinese (zh)
Inventor
S·施密特
S·海佩尔
D·布埃勒
C·德圣埃格宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of CN101939966A publication Critical patent/CN101939966A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/282Hierarchical databases, e.g. IMS, LDAP data stores or Lotus Notes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/335Filtering based on additional data, e.g. user or group profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention relates to the network gateway field, limit method and system in particular to the notion that is used to use new peer-group, wherein to the access rights of subscriber profile information, given user's peer-group is defined as comprising user's set of all members of all communities of this user, wherein, in described web door, defined single community, wherein, on described web door, realized a plurality of synthetic application, wherein, each synthetic application (19; 50) user who has predetermined quantity is using described synthetic application work, be this synthetic application build community, it is characterized in that the following step: a) by all synthetic application that to collect described user be its member, described peer-group based on requesting users, make up filter (650,660,670), b) when from described user's registration table, selecting (680) user profile, use described filter as additional constraint, so that all Query Results are restricted to the related subscriber profile information of member with described given user's peer-group, c) described result are shown to user (690).

Description

Be used to use the notion of new equity to limit method and system to the access rights of subscriber profile information
1. background technology
1.1. technical field
The present invention relates to the network gateway field.Limit method and system in particular to the notion that is used to use new peer-group to the access rights of subscriber profile information.
1.2. The description of prior art and shortcoming
In this field, term " the synthetic application " has defined the application of trustship on the web portal platform (host), this application is by at the special-purpose of using such as shop or virtual team space, and combination makes up such as portlets (portlet), wikis, document library and Web service with being connected.Single portal platform can the same synthetic application of trustship a plurality of examples, for example, the different team space of the communities of users of different associations.Synthetic application is to make up from describing the assembly comprised and the template of their setting and interconnection.
Fig. 1 illustrates and constitutes the overview that prior art application foundation structure 11-herein also is abbreviated as the assembly of the system architecture in AI-overall gate system 10.The application foundation structure comprises:
The molding application foundation structure 13-of template the in-treatment system and new synthetic establishment of using also is abbreviated as TAI herein,
-handle the synthetic application foundation structure 15 of connection between the assembly that application example 19 and management use and data flow-also be abbreviated as CAI herein in when operation,
The component register table 27 of the commercial assembly of installing in-the management system, and
-door processor 29, this is specific local component, it manages the relevant auxiliary 8 of any door, and as the webpage or the portlets of the application foundation structure in the door, and this door processor is used for creating this auxiliary by instantiation assembly 17 between the new synthetic startup stage of using.
Molding application foundation structure (TAI) but comprise the template of quoting 23 in assembly 13 management systems to the assembly of the instantiation in this locality of assembly tabulation 27.As example, the template that shopping is used can comprise quoting following each assembly: the document library assembly that is used to keep available goods and their description, allow the client handle the shop portlets of actual purchase transaction, handle the invoice commercial affairs assembly of payment process, and blog (blogging) assembly that allows the client their satisfaction to be made comment.
TAI assembly 13 also by instantiation assembly 17 from the template establishment application example, the instantiation assembly 17 single configuration by creating or duplicating the commercial assembly that is cited usually, the independent example of the commercial assembly that establishment is cited, so that can be from a plurality of application examples of same template establishment, and can be not interfering with each other.
For template referred to above, instantiation (assembly) 17 will be created single locker room in addition in document library, quoted the single configuration of the invoice assembly of bank account, and be set to show from the goods of the document library of being created and the invoice component instance of being created appointed the single configuration of the shop portlets of payment processes.Particularly, instantiation (assembly) 17 needs to create necessary door auxiliary, carry out mutual webpage as allowing with the synthetic application of being created, normally by using par-ticular processor 29 to finish, par-ticular processor 29 is created those door auxiliaries 8, and they and the commercial assembly of using are linked.
The synthetic application example of being created 19 has kept context 25, wherein lists to constitute the synthetic component instance of using.
Fig. 2 illustrates the overview of memory assembly related in the portal architecture 10, portal architecture 10 comprise dispose in the assembly 14 with dispose relevant code, and the runtime environment in the container 12 during one or more operation of wherein carrying out the assembly of being disposed.
For synthetic application context, the auxiliary of deployment is:
-be stored in the application component in the component register table 18,
-be stored in the template in the template directory 20.
Then, quote this data by the specific data of using 16 of example.
With reference now to focus of the present invention,, the synthetic application of prior art is the main concept of the service-oriented architecture of prior art.They allow the end user to programme and by defining some metamessages such as configuration data and application structure simply, assemble business logic from the set of giving locking assembly.
Prior art is synthetic to be used, and for example, comes supported by prior art IBM WebSphere Portal and other known product.
With reference now to Fig. 3,4,5A, 5B,, for very technical problem of the present invention, the cooperation platform based on Web of prior art is supported the notion of " community " usually.Community 50 (for example, the circle 50 among Fig. 5 A) is people's set-for example, shares the specific target or people D, E, the F of interest.Under member's the situation that is a given community, have access rights usually, so that can cooperation together in one or more synthetic application to resources shared in the community or door object 8 (Fig. 1) (as document, web portal pages, and portlets 32).Other communities 51 and 52 of the people who has similar function and wherein comprise exist jointly.
Community of the prior art utilizes the founder of community to create and manage in the mode of dynamic program request (on-demand), and the founder of community is allowed to invite other people the community management person to community.This comprises many manual workings unfriendly.
Specifically with reference to figure 3, in the prior art cooperation platform, the access control of user data is managed in the mode with the quadrature of community notion by logical program assembly 36 usually.This means that the safety officer defines the profile information which other user which user is allowed to see by logical subscriber hypervisor assembly 34.Based on this visit control information, the user can benefit from people's perception (awareness) function, as " who is just online now ... ".Below with reference to Fig. 4 its details is described.
Specifically with reference to figure 4, this illustrates the Access Management Access to the user at a certain given sole user of prior art, when this sole user starts search to other users, referring to the step 1 among Fig. 4, this user uses the corresponding user interfaces at this searching request, and this is provided to him by certain portlets 41.This portlets 41 is delivered to user management component 34 with his request, and this assembly 34 (intern) again provides to the access rights of user data memory with the group data storage, referring to step 2.
Then, in further step 3, carry out interactive step between assembly 34 and access control components 36, whether mentioned user " Bob " is allowed to see other users before checking.Manage corresponding control information by access control components 36, therefore these assembly 36 storages and the visit information of managing relevant all types resource, also comprise resource " user's " visit information.
For this reason, the access rights of access control components 36 inquiring user Bob in its current configuration are referring to step 4.
In order fully to realize, can also pass through to observe the clauses and subclauses of user Bob, the static access information of Query Database 39.The result is turned back to user management component 34, and this user management component 34 is assessed this result, and memory device 38 (for example, the LDAP user memory) sends searching request to the back-end, so that the whole available users of search.
In addition, unfriendly, for the step 5 among Fig. 4, do not have dynamic method can be used for allowing to relate to " admin " user of safety management task, given user's available user base (base) is restricted to him the people that need cooperate with it.If it is essential that certain thing like this is arranged, then admin will need to manage each user's access rights, if the membership qualification of a community changes, and the individual manpower that this causes admin to cost a lot of money.
In addition, the prior art collaborative tools only allows each user to search for all users from available catalogue.Yet this is very big shortcoming because in many cases, complete user list one for example, hundreds of or thousands of user are simply too big, to such an extent as to the individual can not roll and control.So, desired result can make title invisible for other people.Yet, be by using black tabulation (list) or white tabulation (list) for other users' " invisible " unique channel.Yet those tabulations need be safeguarded by each unique user, and this can cause the individual manpower that costs a lot of money again.
1.3. target of the present invention
So, target of the present invention provides more effectively and the flexibly method and system that is used to limit to the access rights of subscriber profile information.
2. content of the present invention and advantage
This target of the present invention is to realize by the feature of being stated in the appended independently claim.In requiring, corresponding subclaim set forth further useful layout and embodiment of the present invention.Now should be with reference to appended claim.
The aspect the most widely of the method according to this invention, provide a kind of notion that is used to use new peer-group to limit method to the access rights of subscriber profile information, wherein, given user's peer-group is defined as comprising user's set (set) of all members of all communities of this user, wherein, in described web door, defined single community, wherein, on described web door, a plurality of synthetic application have been realized, wherein, each synthetic application (19; 50) user who has predetermined quantity is using described synthetic application work, is this synthetic application build community, it is characterized in that the following step:
A) by all synthetic communities that use that to collect described user be its member,, make up filter (650,660,670) based on the described peer-group of requesting users
B) when from described user's registration table, selecting (680) user profile, use described filter as additional constraint, so that all Query Results are restricted to the related subscriber profile information of member with described given user's peer-group,
C) described result is shown to user (690).
In addition, be execution in step b), replace the LDAP filter, realize explicit back filtration step, so that all the related subscriber profile information of user that from Query Result abandons not peer-group with the user of described request, comprised.
About advantage:
Method of the present invention provides automatic visual control based on community member's qualification for the user, and wherein, the user is allowed to see automatically,, perceives other community members that is.
By method of the present invention, can be advantageously visible user's set just accurately be restricted to interoperable those users, for example, the member of the community of sharing.
In addition, advantageously, method of the present invention provides the correlation of the single community of automatic assessment unique user.
The present invention is based on the notion of introducing " peer-group ", wherein, peer-group is associated with given user, is the set of sharing the user of at least one community member's qualification with this given user.Preferably, the membership qualification of a certain community is the membership qualification by same synthetic application, and perhaps, in other words, the membership qualification of same collaboration applications is defined.
In addition, according to this principle, to the access control of the resource of mentioned before web door,, be based on peer-group referred to above according to the present invention.So, method and system of the present invention is supported specific operator scheme, wherein, the effective access control of given user only is subjected to his control in corresponding membership qualification synthetic or collaboration applications.Like this, the user is allowed to perceive another user's existence, and to have only this user be the part of his peer-group, just can visit this user's user profiles.
3. description of drawings
Show the present invention by example, the present invention is not limited by the shape of the figure in the accompanying drawing, wherein:
Fig. 1 and 2 is illustrated in the most basic construction package that the portal is used for the prior art hardware and software environment of art methods,
Fig. 3 illustrates the dependency structure assembly that is specifically designed to the prior art hardware and software environment management access control authority that is used for art methods in the portal,
Fig. 4 summarily illustrates the visit of the employed user profile of prior art access method in the prior art hardware and software environment of Fig. 3 and the block diagram of management,
Fig. 5 a illustrates according to the prior art user collaboration in the different community in the door circumstance of Fig. 3;
Fig. 5 b illustrates user's observability (also being prior art) of the collaboration user of Fig. 5 a;
Fig. 6 is the abundant diagram according to Fig. 4 of invention assembly of method according to a preferred embodiment of the invention, comprises the mutual controlled step of carrying out in the method for the invention;
Fig. 7 is the diagram of user's observability when using the inventive method.
4. embodiment
Usually with reference to the accompanying drawings, and particularly with reference to figure 6, when operation realizes the program of the preferred embodiment of method of the present invention in door circumstance, the visit to the user profile of sole user Bob is described as follows:
Utilize the discussion of prior art described as mentioned, carry out first step 1,2,3 and 4.In Fig. 6, they are represented to 640 with Ref. No. 610 respectively.The result is, if Bob is allowed to see other users, then this result can use user management component 34.
Then, in the step 650 of novelty, realized of the restriction of active user's observability by community's filter assemblies 62 that embodiments of the invention provided to user's subclass of the community of Bob.For this reason, community of the present invention filter 62 transmissions are shared synthetic all users that use and the inquiry request of group with it to example user Bob.This request is directed to application foundation structure 11, and this application foundation structure 11 is that prior art is known, and the information of storage and the relevant synthetic application that realizes in door of management.This program assembly 11 determines that at first example user Bob is all synthetic application of its member.The synthetic application that this information can add based on Bob and be used as user or the group that those synthetic members that use list.Application foundation construction package 11 is from storage 39 these information of retrieval, referring to step 660.Application component 11 turns back to user management component 34 with this information, referring to step 670.
Now, user management component is used a plurality of user names of the member of a plurality of synthetic application of representing Bob, so that set up the filter criteria that is generated by invention, abundant user management component 34.So, as the result of this assessment, by 62 cooperations of user management component 34 and community's filter assemblies, generate searching request, it comprises synthetic use and corresponding to the corresponding restricted member of the synthetic application of Bob.
Then, by community's filter 62 of user management component 34 searching request of this generation is sent to rear end user data memory 38, so that obtain restricted a plurality of users' user profile, rather than as carrying out in the prior art, obtain all users' user profile.
Next, it is as follows to be given in the example of the information of returning in the step 670:
Returns?list?of?Distinguished?names
{uid=bob,o=yourco:uid=alice,o=yourco:cn=allmanagers,o=yourco}
In addition, also provide example at the filtered request of LDAP memory 38 with false code, as follows:
find?all?users?from?LDAP?where?displayname=′bo*′and
distinguishednames?in
{uid=bob,o=yourco:uid=alice,o=yourco:cn=allmanagers,o=yourco}
The effect of method of the present invention is for the restricted user's observability such as any example user of the user Bob in the description of front.By method of the present invention, set up special peer-group, wherein, the user of door is the implicit expression member of their single peer-group now.
With reference to figure 7, the peer-group of user E is the set of people B, D, F.In addition, the peer-group of people A is null set.The peer-group of user B is people D, E, and the peer-group of people C is people D, F, and the peer-group of people D is people C, F, B, E.
Because method of the present invention, all users are automatically allowed the people of single peer-group with them to communicate, and do not select and can not limit the user who carries out difficulty from have the set to all users of the access rights of door.Like this, users'comfort enlarges markedly, because communication is significantly simplified and significantly simplified owing to setting up the selection of communicating by letter with which user.So, any example user only sees that automatically he is its member and the communication parter of his the synthetic application of cooperating with it thus.
As can be seen from Figure 7, for example, for user C, this user can not aware user E, because the synthetic application that user E and user C do not share.Notice that each circle among Fig. 7 is all corresponding to synthetic an application, a people is arranged in this circle expression this person in this synthetic membership qualification of using.
In addition, advantageously, Fig. 7 is illustrated under the situation that new user A adds community 52, and she will see user C, D and F automatically, because they also are synthetic 52 the members of using.Method of the present invention also can comprise extra access control step, and this step can be used on by the access control of carrying out as the method for the present invention of its base form, as described above.Therefore preferably, this can carry out under specific circumstances, for example, when a people must provide some management, and has been provided very high access rights, still, and during still not to whole whole a plurality of users' of door access rights.This is huge advantage, for example, under the situation of the merging of carrying out two enterprises, wherein, merges two doors that are pre-existing in, and wherein, the enterprise that user management and door management are confirmed as each merging continues fully respectively.In addition, still can provide the authority of seeing more users that defines as peer-group to the certain user by them.This is in order to send invitation to the new user who does not belong to any community.
It is the hardware execution mode fully that the present invention can present, be software implementation mode or the form that comprises both execution modes of hardware and software element fully.In a preferred embodiment, the present invention realizes with software, includes but are not limited to firmware, resident software, microcode or the like.
In addition, the present invention can also present the form of computer program, and this product can conduct interviews from computer usable medium or computer-readable medium, and it provides program code, uses or uses with them for computer or any instruction execution system.For this specification, computer usable medium or computer-readable medium can be any equipment that can comprise, store, transmit, propagate or transmit the program of using or being used in combination with them for instruction execution system, equipment or device.
Medium can be electronics, magnetic, optics, electromagnetism, ultrared or semiconductor system (equipment or device) or propagation medium.The example of computer-readable medium comprises semiconductor or solid-state memory, tape, removable computer diskette, random-access memory (ram), read-only memory (ROM), hard disc and CD.The current example of CD comprises Compact Disc-Read Only Memory (CD-ROM), CD read/write (CD-R/W), and DVD.
The data handling system that is applicable to storage and/or executive program code will comprise a processor that is couple to memory component by system bus directly or indirectly at least.Memory component can be included in local storage, the mass storage that uses in the practical implementation of program code, and cache memory, it provides the temporary storage of some program code at least, in the process of implementation must be from the number of times of mass storage retrieval coding so that reduce.
I/O or I/O equipment (including but are not limited to keyboard, display, indicating equipment or the like) can directly or by the I/O controller be couple to system.
Network adapter also can be couple to system, so that data handling system is by getting involved privately owned or public network is couple to other data handling systems or remote printer or memory device.Modulator-demodulator, cable modem and Ethernet card are the network adapter of several current available types.

Claims (6)

1. a notion that is used to use new peer-group limits the method to the access rights of subscriber profile information, wherein, given user's peer-group is defined as comprising user's set of all members of all communities of this user, wherein, in described web door, defined single community, wherein, on described web door, realized a plurality of synthetic application, wherein, each synthetic application (19; 50) user who has predetermined quantity is using described synthetic application work, is this synthetic application build community, it is characterized in that the following step:
A) by all synthetic communities that use that to collect described user be its member,, make up filter (650,660,670) based on the described peer-group of requesting users,
B) when from described user's registration table, selecting (680) user profile, use described filter as additional constraint, so that all Query Results are restricted to the related subscriber profile information of member with described given user's peer-group,
C) described result is shown to user (690).
2. method according to claim 1 wherein, is execution in step b), replace the LDAP filter, realize explicit back filtration step, so that all the related subscriber profile information of user that from Query Result abandons not peer-group with requesting users, comprised.
3. method according to claim 1 wherein, realizes the ordering between the described synthetic application, so that set up the interior laminate layer structure of the user name that will show.
4. method according to claim 1, wherein, for having the user who has defined certain community's characterization information, assessment is corresponding to certain metadata of each the described synthetic application in the described synthetic application, and assess the correlation of at least one described synthetic application and community's characterization information, and show to described user.
5. a notion that is used to use new peer-group limits the electronic data processing system to the access rights of subscriber profile information, wherein, given user's peer-group is defined as comprising user's set of all members of all communities of this user, wherein, in described web door, defined single community, wherein, on described web door, realized a plurality of synthetic application, wherein, each synthetic application (19; 50) user who has predetermined quantity is using described synthetic application work, is this synthetic application build community, and described system is characterised in that:
A) be used for by all synthetic communities that use that to collect described user be its member, make up the device of filter (650,660,670) based on the user's of described request described peer-group,
B) be used for using described filter as additional constraint when when described user's registration table is selected (680) user profile, so that all Query Results are restricted to the device of the subscriber profile information related with the member of described given user's peer-group,
C) be used for described result is shown to the device of user (690).
6. a notion that is used to use new peer-group limits the computer program to the access rights of subscriber profile information, wherein, given user's peer-group is defined as comprising user's set of all members of all communities of this user, wherein, in described web door, defined single community, wherein, on described web door, realized a plurality of synthetic application, wherein, each synthetic application (19; 50) user who has predetermined quantity is using described synthetic application work, be this synthetic application build community, comprise computer usable medium comprising computer-readable program, wherein, computer-readable program comprises functional unit, when carrying out this functional unit on computers, cause computer to carry out the following step:
A) by all synthetic communities that use that to collect described user be its member,, make up filter (650,660,670) based on the described peer-group of requesting users,
B) when from described user's registration table, selecting (680) user profile, use described filter as additional constraint, so that all Query Results are restricted to the related subscriber profile information of member with described given user's peer-group,
C) described result is shown to user (690).
CN2009801042776A 2008-02-05 2009-01-14 Be used to use the notion of new equity to limit method and system to the access rights of subscriber profile information Pending CN101939966A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP08151050 2008-02-05
EP08151050.5 2008-02-05
PCT/EP2009/050352 WO2009098110A2 (en) 2008-02-05 2009-01-14 Method and system for restricting access rights on user profile information using a new notion of peer

Publications (1)

Publication Number Publication Date
CN101939966A true CN101939966A (en) 2011-01-05

Family

ID=40512586

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009801042776A Pending CN101939966A (en) 2008-02-05 2009-01-14 Be used to use the notion of new equity to limit method and system to the access rights of subscriber profile information

Country Status (3)

Country Link
US (1) US9628492B2 (en)
CN (1) CN101939966A (en)
WO (1) WO2009098110A2 (en)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8943551B2 (en) 2008-08-14 2015-01-27 Microsoft Corporation Cloud-based device information storage
US9824198B2 (en) 2011-07-14 2017-11-21 Docusign, Inc. System and method for identity and reputation score based on transaction history
CN103209196A (en) * 2012-01-12 2013-07-17 中兴通讯股份有限公司 Portal access method and device
US9405932B2 (en) * 2013-05-24 2016-08-02 Microsoft Technology Licensing, Llc User centric data maintenance
US20150100576A1 (en) * 2013-10-09 2015-04-09 Foxwordy, Inc. Default Network
US10841337B2 (en) 2016-11-28 2020-11-17 Secureworks Corp. Computer implemented system and method, and computer program product for reversibly remediating a security risk
US10735470B2 (en) 2017-11-06 2020-08-04 Secureworks Corp. Systems and methods for sharing, distributing, or accessing security data and/or security applications, models, or analytics
US10594713B2 (en) 2017-11-10 2020-03-17 Secureworks Corp. Systems and methods for secure propagation of statistical models within threat intelligence communities
US10977263B2 (en) * 2017-11-28 2021-04-13 Sap Se Optimization of multiple query filters
US11003718B2 (en) 2018-06-12 2021-05-11 Secureworks Corp. Systems and methods for enabling a global aggregated search, while allowing configurable client anonymity
US10785238B2 (en) 2018-06-12 2020-09-22 Secureworks Corp. Systems and methods for threat discovery across distinct organizations
US11316867B2 (en) 2019-04-23 2022-04-26 Microsoft Technology Licensing, Llc Generated audio signal granting access to resource
US11949677B2 (en) * 2019-04-23 2024-04-02 Microsoft Technology Licensing, Llc Resource access based on audio signal
US11310268B2 (en) 2019-05-06 2022-04-19 Secureworks Corp. Systems and methods using computer vision and machine learning for detection of malicious actions
US11418524B2 (en) 2019-05-07 2022-08-16 SecureworksCorp. Systems and methods of hierarchical behavior activity modeling and detection for systems-level security
US11381589B2 (en) 2019-10-11 2022-07-05 Secureworks Corp. Systems and methods for distributed extended common vulnerabilities and exposures data management
US11522877B2 (en) 2019-12-16 2022-12-06 Secureworks Corp. Systems and methods for identifying malicious actors or activities
US11588834B2 (en) 2020-09-03 2023-02-21 Secureworks Corp. Systems and methods for identifying attack patterns or suspicious activity in client networks
US11528294B2 (en) 2021-02-18 2022-12-13 SecureworksCorp. Systems and methods for automated threat detection
US12034751B2 (en) 2021-10-01 2024-07-09 Secureworks Corp. Systems and methods for detecting malicious hands-on-keyboard activity via machine learning
US12015623B2 (en) 2022-06-24 2024-06-18 Secureworks Corp. Systems and methods for consensus driven threat intelligence

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020129135A1 (en) * 2000-12-22 2002-09-12 Delany Shawn P. Determining group membership
CN1482553A (en) * 2002-08-15 2004-03-17 �Ҵ���˾ Network system allowing the sharing of user profile information among network users
US20040107139A1 (en) * 2001-05-10 2004-06-03 Fujitsu Limited Service providing method, server device, medium and program
US20070162547A1 (en) * 2006-01-11 2007-07-12 Groope.Com Llc Methods and apparatus for community organization

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7464072B1 (en) * 2001-06-18 2008-12-09 Siebel Systems, Inc. Method, apparatus, and system for searching based on search visibility rules
US20050240763A9 (en) * 2001-08-06 2005-10-27 Shivaram Bhat Web based applications single sign on system and method
US7225462B2 (en) * 2002-06-26 2007-05-29 Bellsouth Intellectual Property Corporation Systems and methods for managing web user information
EP1627286A1 (en) * 2003-05-28 2006-02-22 Belarc, Inc. Secure user access subsystem for use in a computer information database system
US20060047725A1 (en) * 2004-08-26 2006-03-02 Bramson Steven J Opt-in directory of verified individual profiles

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020129135A1 (en) * 2000-12-22 2002-09-12 Delany Shawn P. Determining group membership
US20040107139A1 (en) * 2001-05-10 2004-06-03 Fujitsu Limited Service providing method, server device, medium and program
CN1482553A (en) * 2002-08-15 2004-03-17 �Ҵ���˾ Network system allowing the sharing of user profile information among network users
US20070162547A1 (en) * 2006-01-11 2007-07-12 Groope.Com Llc Methods and apparatus for community organization

Also Published As

Publication number Publication date
US20090198682A1 (en) 2009-08-06
WO2009098110A2 (en) 2009-08-13
WO2009098110A3 (en) 2009-10-01
US9628492B2 (en) 2017-04-18

Similar Documents

Publication Publication Date Title
CN101939966A (en) Be used to use the notion of new equity to limit method and system to the access rights of subscriber profile information
US6850939B2 (en) System and method for providing selective data access and workflow in a network environment
CN102419744B (en) Semantic analysis of information
US9292828B2 (en) Hierarchical display of project information in a collaboration environment
US6754672B1 (en) System and method for efficient integration of government administrative and program systems
US7548930B2 (en) Platform for management of internet based public communications and public comment
US20090222382A1 (en) Platform for management of internet based public communications and public comment
US20070220016A1 (en) Secured content syndication on a collaborative place
CN101281539A (en) Collaborative workspace
US20030154232A1 (en) Facilitating improved workflow
US8316420B2 (en) Access control on dynamically instantiated portal applications
CN102171685A (en) Obtaining content and adding same to document
CN109739541B (en) Dual-system code/file management platform architecture
Rai et al. Comparative features of integrated library management software systems available in Delhi
US7533105B2 (en) Visual association of content in a content framework system
Han et al. Public participation GIS (PPGIS) for town council management in Singapore
EP1367513A2 (en) Improved workflow system
US20040249659A1 (en) Procurement framework
Otuonye Cloud-Based Enterprise Resource Planning for Sustainable Growth of SME S in Third World Countries
KR101183768B1 (en) System and method providing integrated view, server having function for generating view
Hall et al. Design and implementation of a map-centred synchronous collaboration tool using open source components: the MapChat project
Opfer Intranet internet applications for the construction industry
Theocharis et al. Semantic Knowledge Modelling Via Open Linked Ontologies: Ontologies in E-Governance
WO2009068433A1 (en) Dependent membership for collaborative applications in a portal server infrastructure
Karthika et al. Online Property Management System

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110105